ISS World Latin America is the world's largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Hi-Tech Electronic Investigations and Cyber Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.
Track 1: Lawful Interception And Hi-Tech Investigation Product Presentations
Track 2: Lawful Intercept And Hi-Tech Investigation Product Presentations
Track 3: Social Media Investigations, Monitoring And Cyberthreat Detection Product Presentations
Track 4: Investigating Dark Web and Crypto Currency Transaction Traceback Training
Track 5: Mobile Signal Intercept and Electronic Surveillance Product Presentations
(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (11 Classroom Hours) Led by Sworn Law Enforcement Officers
Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PolicePractitioners Guide to Internet Investigations
(7 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (11 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists
Tuesday, 29 October 2024
Seminar #1
09:00-17:00Online Social Media and Internet Investigations (6 Classroom Hours)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceThis one day session provides an up-to-date understanding of how social networking sites work and how members act and interact. Attendees will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.
09:00-10:00
Proxies and VPNs: Identity Concealment and Location Obfuscation
10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
14:45-15:45
Ultra-Wideband Geolocation and Cyber OSINT
16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Seminar #2
09:00-17:00(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving16:00-17:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resourcesThursday, 31 October 2024
Seminar #3
11:30-12:30(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
WELCOME REMARKS & KEYNOTE:
Wednesday, 30 October 2024
8:15-8:30
Opening Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Latin America Exhibit Hours:
Wednesday, 30 October 2024
10:00 - 18:00
Thursday, 31 October 2024
9:30 - 12:30
ISS World Latin America 2024 - Agenda at a Glance
Track 1: Lawful Interception And Hi-Tech Investigation Product PresentationsThursday, 31 October 2024
8:30-9:30
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Track 2: Lawful Intercept And Hi-Tech Investigation Product Presentations
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Tuesday, 29 October 2024
9:00-10:00
How to face analysis challenges with integrated Cyber Intelligence solutions: From Electronic Surveillance to Encrypted Communication, using a case-study
“Follow the white rabbit” starting from limited and vague information and reaching focused and reliable evidence. Going into a structured case that focuses on the steps that build knowledge and intelligence information for the LEAs, this case study will replicate a realistic approach of the solution of the investigation with actual and proven technologies.
Presented by AREA09:00-10:00
Spyder Space: Revolutionize Your Investigative Processes with our cutting-edge solution! Harnessing Data from Mobile Sources, We Optimize, Analyze, and Craft Powerful Insights!
Presented by MOVIA10:15-11:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS10:15-11:15 Session B
Challenges of Multicrime Digitalization
Presented by IAFIS11:30-12:30
Digital Sovereignty
Presented by Allot11:30-12:30 Session B
Answering the 5W Intelligence Questions Using Advanced Techniques in Multi-Layered Investigation Platform.
Presented by Rayzone Group14:45-15:45
Solving the challenges of Data-Fusion and Validation: Communication Data, live lawful interception data, mobile forensics extraction and more in a single platform. Use cases and demonstration.
Taking the examiner into the real optimization of merging multi-source data with a single advanced correlation analysis platform: CDRs and IPDRs, Lawful Interception, Electronic Surveillance, fiscal reports and payments, vehicle transit, forensic extractions, GPS tracks and more. Introducing a unique and portable tool which can help validate the position of any target using mobile network coverage to enhance the quality and reliability of results.
Presented by AREA
16:00-17:00
Pinpoint key evidence & solve cases FASTER with the new FTK 8.1
- New intuitive interface design makes it easier for both experienced investigators and non-technical users to navigate within FTK
- Effortlessly pivot through multimedia evidence using FTK’s new image Thumbnail View - Super Timeline visual representation of case evidence helps investigators understand what was happening during an incident or crime
- Filter Panel automatically categorizes artifacts & easily build complex compound filters with Smart Grid
Presented by Exterro
Wednesday, 30 October 2024
9:10-10:00
Top 5 AI Trends Redefining Law Enforcement Investigations
Presented by Cognyte13:00-14:00 Session A
Leveraging BORDERINT to Safeguard Your National Borders.
Presented by Rayzone Group13:00-14:00 Session B
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by MOVIA14:30-15:30
Unraveling Hidden Patterns and Relationships with Advanced Voice and IP Analytics
Presented by Cognyte16:00-17:00 Session A
Unleash the intelligence hidden in encrypted communications with the advanced analysis of forensic content derived metadata and powerful Data Fusion. Use cases and demo.
Highlighting two cornerstone concepts essential for a comprehensive intelligence platform. One: the creation and collection of rich metadata form network communications. Two: the analysis and processing of data to extract intelligence and investigative data.
Presented by AREA16:00-17:00 Session B
De-anonymization of Instant Messengers’ Users
Presented by Prelysis
Track 3: Social Media Investigations, Monitoring And Cyberthreat Detection Product Presentations
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Tuesday, 29 October 2024
13:30-14:30
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS
Wednesday, 30 October 2024
9:10-10:00
Beyond LI: Advanced Investigation Fusion Techniques for an Evolving Digital Landscape
As lawful intercept (LI) continues to evolve, the value of LI data is diluted by the increased use of encryption and over-the-top communication. More and more, Law Enforcement professionals must look for ways to enhance LI data by overlaying other sources, such as digital forensics, OSINT, deep/dark web, even blockchain, to gain a more complete picture of target activities and patterns of life. In this workshop, we will explore the benefits and challenges of using a multi-source approach to investigations, show how ML/AI enrichments can help add focus and context, and provide an overview of the tools and techniques that can help you get to outcomes faster in a rapidly evolving digital landscape.
Presented by JSI
13:00-14:00
Facial Discovery: Identifying Unknown Persons with OSINT and AI
Afonso Pena, Director of Sales South America, Clearview AIThursday, 31 October 2024
08:30-09:30
Boost your investigative prowess with AI on intricate data to uncover remarkable insights and unprecedented connections. Explore real-world applications.
Presented by MOVIA10:30-11:15
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS11:30-12:30 Session B
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Track 4: Investigating Dark Web and Crypto Currency Transaction Traceback Training
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Wednesday, 30 October 2024
14:30-15:30
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS16:00-17:00
Deanonymizing Extremist Groups on the Dark Web Using OSINT
Extremist groups and forums on the Dark Web are active platforms of radicalization, which can lead to acts of violence. This case study examines the darknet forum Dogolachan, which played an influential role in the tragic Suzanno Massacre in Brazil. We’ll be looking at the specific OSINT tools and techniques used to deanonymize the forum’s admins.
Presented by Social Links
Track 5: Mobile Signal Intercept and Electronic Surveillance Product Presentations
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Wednesday, 30 October 2024
09:10-10:00
ARGOS: Is my phone infected?
Presented by Top Solution13:00-14:00
An essential all-in-one on the field and at the command center: Electronic Surveillance tacticals with AI enabled, Cyber Intelligence unified platform. Use cases and demo.
Demonstrating Electronic Surveillance solutions and their multiple benefits for the users, unique design, construction quality and principles, together with the adoption of innovative capabilities of AI and ML technologies, to help and speed up daily operations of LEAs, in a forensic proof centralized platform.
Presented by AREA14:30-15:30
Using Location Intelligence to Combat Contraband Mobile Phones in Prisons
Mobile phones are one of the most smuggled items into prisons, used by inmates to continue criminal enterprises, harass witnesses, or plot escape. While signal jammers, Managed Access Systems, and even dogs have been used to combat the trend, none have been effective. In this session, learn how an end-to-end location platform that automatically detects, identifies, and locates devices can help prison staff intercept contraband mobile phones without jeopardizing their own communications channels.
Presented by SS816:00-17:00
TACTICAL SATELLITE TRAFFIC MONITORING SOLUTION.
Inmarsat I-SAT Phone Pro, Iridium and Thuraya tactical satellite traffic monitoring. Voice, data, and geolocation. SBD (Short Burst Data) of Iridium devices.
Presented by PAT SystemsThursday, 31 October 2024
8:30-9:30 Session A
TACTICAL SATELLITE TRAFFIC MONITORING SOLUTION.
Inmarsat I-SAT Phone Pro, Iridium and Thuraya tactical satellite traffic monitoring. Voice, data, and geolocation. SBD (Short Burst Data) of Iridium devices.
Presented by PAT Systems8:30-9:30 Session B
Lawful Interception and Electronic Surveillance challenges made easy with cutting-edge technology: A centralized Monitoring Center which is AI enabled and holds 5G ready Cyber-intelligence. Interactive.
Introducing the enhanced capabilities of adopting AI and Machine Learning technologies and the principles within a centralized 5G Monitoring Facility for LEAs.
Presented by AREA11:30-12:30
ARGOS: Is my phone infected?
Presented by Top Solution